/freebsd-11-stable/etc/gss/ |
H A D | Makefile | 3 FILES= mech qop
|
/freebsd-11-stable/include/rpc/ |
H A D | rpcsec_gss.h | 88 const char *qop; /* quality of protection */ member in struct:__anon6553 144 const char *mechanism, rpc_gss_service_t service, const char *qop, 147 const char *qop); 153 bool_t rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret);
|
/freebsd-11-stable/contrib/serf/auth/ |
H A D | auth_digest.c | 54 const char *qop; member in struct:digest_authn_info_t 134 const char *qop, 137 if (!qop || strcmp(qop, "auth") == 0) { 174 status = build_digest_ha2(&ha2, path, method, digest_info->qop, pool); 187 if (digest_info->qop) { 191 hdr = apr_psprintf(pool, "%s, nc=%08x, cnonce=\"%s\", qop=\"%s\"", 195 digest_info->qop); 200 quality of protection code (qop) and HA2 result. */ 204 digest_info->cnonce, digest_info->qop, ha 131 build_digest_ha2(const char **out_ha2, const char *uri, const char *method, const char *qop, apr_pool_t *pool) argument 249 const char *qop = NULL; local 477 const char *qop = NULL; local [all...] |
/freebsd-11-stable/lib/librpcsec_gss/ |
H A D | rpcsec_gss_int.h | 80 caddr_t xdr_ptr, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, 83 caddr_t xdr_ptr, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc,
|
H A D | rpcsec_gss_prot.c | 97 gss_ctx_id_t ctx, gss_qop_t qop, 130 maj_stat = gss_get_mic(&min_stat, ctx, qop, 143 maj_stat = gss_wrap(&min_stat, ctx, TRUE, qop, &databuf, 159 gss_ctx_id_t ctx, gss_qop_t qop, 191 if (maj_stat != GSS_S_COMPLETE || qop_state != qop) { 209 if (maj_stat != GSS_S_COMPLETE || qop_state != qop || 96 xdr_rpc_gss_wrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq) argument 158 xdr_rpc_gss_unwrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq) argument
|
H A D | rpcsec_gss_conf.c | 45 #define _PATH_GSS_QOP "/etc/gss/qop" 65 u_int qop; member in struct:qop_info 269 info->qop = strtoul(name, 0, 0); 330 rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret) argument 336 if (strcmp(info->name, qop) == 0 338 *num_ret = info->qop; 356 if (info->qop == num && strcmp(info->mech, mech) == 0) {
|
H A D | svc_rpcsec_gss.c | 121 bool_t cl_locked; /* fixed service+qop */ 734 "<mech %.*s, qop %d, svc %d>", 748 gss_qop_t *qop) 791 *qop = qop_state; 961 gss_qop_t qop; local 1096 if (!svc_rpc_gss_validate(client, msg, &qop)) { 1125 client->cl_qop = qop; 1126 client->cl_rawcred.qop = _rpc_gss_num_to_qop( 1127 client->cl_rawcred.mechanism, qop); 1136 * particular service+qop pai 747 svc_rpc_gss_validate(struct svc_rpc_gss_client *client, struct rpc_msg *msg, gss_qop_t *qop) argument [all...] |
H A D | rpcsec_gss.c | 121 const char *mechanism, rpc_gss_service_t service, const char *qop, 138 if (qop) { 139 if (!rpc_gss_qop_to_num(qop, mechanism, &qop_num)) 228 rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, const char *qop) argument 239 if (qop) { 240 if (!rpc_gss_qop_to_num(qop, mechanism, &qop_num)) { 120 rpc_gss_seccreate(CLIENT *clnt, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
|
/freebsd-11-stable/sys/rpc/rpcsec_gss/ |
H A D | rpcsec_gss_int.h | 81 gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, 84 gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq);
|
H A D | rpcsec_gss_conf.c | 69 rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret) argument 72 if (!strcmp(qop, "default")) {
|
H A D | rpcsec_gss_prot.c | 118 gss_ctx_id_t ctx, gss_qop_t qop, 137 maj_stat = gss_get_mic_mbuf(&min_stat, ctx, qop, args, &mic); 165 maj_stat = gss_wrap_mbuf(&min_stat, ctx, TRUE, qop, 225 gss_ctx_id_t ctx, gss_qop_t qop, 277 if (maj_stat != GSS_S_COMPLETE || qop_state != qop) { 302 if (qop_state != qop || conf_state != TRUE) { 117 xdr_rpc_gss_wrap_data(struct mbuf **argsp, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq) argument 224 xdr_rpc_gss_unwrap_data(struct mbuf **resultsp, gss_ctx_id_t ctx, gss_qop_t qop, rpc_gss_service_t svc, u_int seq) argument
|
H A D | svc_rpcsec_gss.c | 139 bool_t cl_locked; /* fixed service+qop */ 1004 "<mech %.*s, qop %d, svc %d>", 1018 gss_qop_t *qop, rpc_gss_proc_t gcproc) 1071 *qop = qop_state; 1256 gss_qop_t qop; local 1400 if (!svc_rpc_gss_validate(client, msg, &qop, gc.gc_proc)) { 1438 client->cl_qop = qop; 1439 client->cl_rawcred.qop = _rpc_gss_num_to_qop( 1440 client->cl_rawcred.mechanism, qop); 1451 * particular service+qop pai 1017 svc_rpc_gss_validate(struct svc_rpc_gss_client *client, struct rpc_msg *msg, gss_qop_t *qop, rpc_gss_proc_t gcproc) argument [all...] |
H A D | rpcsec_gss.c | 312 const char *qop, rpc_gss_options_req_t *options_req, 324 if (qop) { 325 if (!rpc_gss_qop_to_num(qop, mechanism, &qop_num)) 444 rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, const char *qop) argument 455 if (qop) { 456 if (!rpc_gss_qop_to_num(qop, mechanism, &qop_num)) { 310 rpc_gss_seccreate(CLIENT *clnt, struct ucred *cred, const char *clnt_principal, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
|
/freebsd-11-stable/sys/rpc/ |
H A D | rpcsec_gss.h | 88 const char *qop; /* quality of protection */ member in struct:__anon13272 158 const char *qop, rpc_gss_options_req_t *options_req, 161 rpc_gss_service_t service, const char *qop); 167 typedef bool_t rpc_gss_qop_to_num_ftype(const char *qop, const char *mech, 236 rpc_gss_service_t service, const char *qop, 243 clnt_principal, principal, mechanism, service, qop, 250 const char *qop) 256 qop); 300 rpc_gss_qop_to_num_call(const char *qop, const char *mech, u_int *num_ret) argument 305 ret = (*rpc_gss_entries.rpc_gss_qop_to_num)(qop, mec 234 rpc_gss_seccreate_call(CLIENT *clnt, struct ucred *cred, const char *clnt_principal, const char *principal, const char *mechanism, rpc_gss_service_t service, const char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument 249 rpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service, const char *qop) argument [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | digest.c | 671 const char *qop) 673 if (digest->request.qop) { 674 krb5_set_error_message(context, EINVAL, "qop already set"); 677 digest->request.qop = malloc(sizeof(*digest->request.qop)); 678 if (digest->request.qop == NULL) { 682 *digest->request.qop = strdup(qop); 683 if (*digest->request.qop == NULL) { 685 free(digest->request.qop); 669 krb5_digest_set_qop(krb5_context context, krb5_digest digest, const char *qop) argument [all...] |
/freebsd-11-stable/lib/libgssapi/ |
H A D | Makefile | 107 MLINKS+= mech.5 qop.5
|
/freebsd-11-stable/lib/libfetch/ |
H A D | http.c | 634 char *qop; member in struct:__anon4700 646 b->realm = b->qop = b->nonce = b->opaque = b->algo = NULL; 655 if (b->qop) 656 free(b->qop); 815 } else if (strcasecmp(key, "qop") == 0) { 816 cs->challenges[cs->count]->qop = 1180 IN char * pszQop, /* qop-value: "", "auth", "auth-int" */ 1183 IN HASHHEX HEntity, /* H(entity body) if qop="auth-int" */ 1188 DEBUGF("Calc: HA1[%s] Nonce[%s] qop[%s] method[%s] URI[%s]\n", 1234 * [opaque] | [message-qop] | [all...] |
/freebsd-11-stable/tools/regression/rpcsec_gss/ |
H A D | rpctest.c | 265 printf("new security context version=%d, mech=%s, qop=%s:\n", 266 rcred->version, rcred->mechanism, rcred->qop);
|
/freebsd-11-stable/crypto/heimdal/appl/gssmask/ |
H A D | gssmask.c | 610 gss_qop_t qop; local 631 &mic_token, &qop);
|
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | digest.c | 690 if (ireq.u.digestRequest.qop == NULL) 769 EVP_DigestUpdate(ctx, *ireq.u.digestRequest.qop, 770 strlen(*ireq.u.digestRequest.qop));
|
/freebsd-11-stable/sys/kgssapi/ |
H A D | gsstest.c | 1017 printf("new security context version=%d, mech=%s, qop=%s:\n", 1018 rcred->version, rcred->mechanism, rcred->qop);
|